| In this paper,we study the d-bounded distance-regular graphΓwith diameter d.We obtain two new formula of calculation of subspace and construct a class of Cartesianauthentication code using the subspaces.The main results are as follows.1.LetΓbe a d-bounded distance-regular graph with geometric parameters(d,b,α)and d≥3.Suppose△(?)△'and i+1≤i+s≤i+s+t,and suppose△and△' aresubspaces with diameter i and i+s+t,respectively.Then the numbers of subspaces (?) inP(x) with△(?)(?)(?)△' and diameter i+t,denoted by N(i,i+s;i+s+t),is determinedby i,s and t,independent of the choice of△and△' and is given bywhere(?)b2 is the Gaussian coefficents with basis b2.2.LetΓbe a d-bounded distance-regular graph with geometric parameters(d,b,α)and d≥3.For x∈V(Γ),let P(x) be a set of all subspaces containing x inΓ.Suppose△1(?)△,0≤t≤i+t and j+t≤i+j+t≤d,and suppose△1 and△are subspacewith diameter t and i+t,respectively.Then the number of subspaces△' in P(x) withdiameter j+t such that△∩△'=△1,denoted by M1(t,i+t,j+t;d),is determined byi,j and t,independent of the choice of△1 and△and is given byFurthermore,the number of subspaces△' in P(x) with diameter j+t such thatd(△∩△')=t,denoted by M(t,i+t,j+t;d),is determined by i,j and t,independent ofthe choice of△1 and△and is given bywhere(?)b2 is the Gaussian coefficents with basis b2.3.LetΓbe a d-bounded distance-regular graph with geometric parameters(d,b,α)and d≥3.For x∈V(Γ),let P(x)be a set of all subspaces containing x inΓ.We also suppose 1≤m00 is a fixed subspace with diameter m0 in P(x).Definethe source states to be the subspaces with diameter m containing△0.Define the encodingrules to be the subspaces with diameter d-m0,which intersects△0 at{x}.Define themessages to be the subspaces with diameter m-m0,which intersect△0 at {x}.Denotethe set of source states,the set of encoding rules,and the set of messages by S,εandM,respectively.Given any△∈S and any△1∈ε,f(△,△1)=△∩△1 is defined.Thenwe confirmed that it is a Cartesian authentication code.4.The construction above yields an Cartesian authentication code,whose size pa-rameters arewhere (?)b2 is the Gaussian coefficents with basis b2.Assume that the encoding rules are chosen according to a uniform probability dis-tribution,and denote the probabilities of a successful impersonation attack and of asuccessful substitution attack by PI and PS,respectively.Then... |